Job Details

ID #51982378
Estado Pennsylvania
Ciudad Bellevue
Full-time
Salario USD TBD TBD
Fuente NORTHWEST BANK
Showed 2024-06-26
Fecha 2024-06-26
Fecha tope 2024-08-25
Categoría Etcétera
Crear un currículum vítae
Aplica ya

It/information Risk Assessor

Pennsylvania, Bellevue 00000 Bellevue USA
Aplica ya

Reference #: 007176e9-e22e-4795-bf6c-4ba16e54bf00

DescriptionThe IT/Information Security Assessor ("Assessor") is responsible for the assessment, verification, review, and audit of technology controls and/or business process controls across the enterprise. The Assessor will be responsible for risk assessments which will require review and evaluation of IT and/or business systems and processes for compliance with defined regulatory standards, internal processes, and procedures. Additionally, the Assessor will be responsible for the identification of 3rd party and 4th party vendor risks, evaluation of control deficiencies, and recommendation on remediation efforts consistent with IT organizational policies, standards, procedures, and regulatory requirements.Essential Functions

Execute vulnerability assessments and compliance reviews; facilitate remediation planning, exposure tracking and communicating risk all done in accordance with industry best practices and established regulatory standards (GLBA, SOX, etc.) and report on mitigation status.

Provide security architecture knowledge and design concepts by partnering with the Enterprise Risk function to help manage technology related risk.

Provide technical expertise to support the Vendor Management Team with 3rd and 4th party supply-chain security and risk assessments, audits, tests, and verification activities, and when appropriate make recommendations to mitigate risk.

Apply or recommend adaptive security requirements and/or measurements based on investigative findings and threat monitoring including performing security risk assessments prior to going into production on new projects.

Assess systems of various scope and complexity to obtain, review, and interpret evidence provided to validate controls are performed effectively.

Conduct and lead assessment interviews and tests to identify technology control gaps that introduce risk to the organization

Execute and assist management with IT audits and regulatory compliance requirements.

Buildout the development of risk assessments, risk meditation, and performance reporting, through working within the IT function and other partners within the business

Participate as the liaison between Enterprise Risk and Information Technology/Information Security to improve the overall ability to identify operational risk , with a focus on continuous control mointoring and pivot to emerging technology and cyber security threats.

Build playbooks for key IT processes and associated process flows

Build, update, and maintain a global policy governance framework to ensure proper evaluation of controls including the identification of significant control deficiencies.Additional Essential Functions

Ensure compliance with Northwest's policies and procedures, and Federal/State regulations

Navigate Microsoft Office Software, computer applications, and software specific to the department in order to maximize technology tools and gain efficiency

Work as part of a team

Work with on-site equipmentAdditional ResponsibilitiesSafety and Health for those without supervisory duties

Abide by the rules of the safety and loss prevention program

Perform work tasks in a safe manner

Report any and all injuries to supervisor

Know what to do in case of an emergencyQUALIFICATIONS

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.Education

Technical Degree Information/Cyber Security or Risk Management Or

Associate's Degree Information/Cyber Security or Risk Management Or

Bachelor's Degree Information/Cyber Security or Risk ManagementWork Experience

5 - 6 years Assessing Information Security / Cyber RiskGeneral E ployee Knowledge, Skills, and Abilities

Ability to establish effective working relationships among team members and participate in solving problems and making decisions

Ability to present and express ideas and information clearly and concisely in a manner appropriate to the audience, whether oral or written

Ability to actively listen to what others are saying to achieve understanding, sharing information with others and facilitating the open exchange of ideas and information

Ability to establish courses of action for self to accomplish specific goals, develop and use tracking systems for monitoring own work progress, and effectively use resources such as time and information

Ability to make right decisions based on perceptive and analytical processes, practicing good judgment in gray areasAdditional Knowledge, Skills and Abilities

Assesses systems security requirements by studying business requirements; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform

Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures

Knowledge of security and audit topics such as FFIEC Guidelines, GLBA, PCI and HIPAA a plus

Knowledge of best practices for technology architecture and design

Ability to assess cybersecurity controls and technology configurations

Ability to build update and maintain a global policy governance framework

Experience and ability to build, manage and update SOX controlsLicenses and Certifications

General Cert App Certification in IT Audit, Information Security, or Risk Management by industry recognized organization. Within 1 year

Cert Sec Compliance Professional Certified Information System Auditor ISACA or something similar - Certification in information systems governance, control, risk, security, audit/assurance and business and cybersecurity professionals, and enterprises risk management Upon HireThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities

Aplica ya Suscribir Reportar trabajo

Puestos de trabajo relacionados